DOI QR코드

DOI QR Code

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm

  • Houari, Nawal Sad (Dept. of Computer Science, University of Oran1 Ahmed BenBella) ;
  • Taghezout, Noria (Dept. of Computer Science, University of Oran1 Ahmed BenBella)
  • Received : 2015.07.09
  • Accepted : 2015.10.15
  • Published : 2016.12.31

Abstract

Our approach permits to capitalize the expert's knowledge as business rules by using an agent-based platform. The objective of our approach is to allow experts to manage the daily evolutions of business domains without having to use a technician, and to allow them to be implied, and to participate in the development of the application to accomplish the daily tasks of their work. Therefore, the manipulation of an expert's knowledge generates the need for information security and other associated technologies. The notion of cryptography has emerged as a basic concept in business rules modeling. The purpose of this paper is to present a cryptographic algorithm based approach to integrate the security aspect in business rules modeling. We propose integrating an agent-based approach in the framework. This solution utilizes a security agent with domain ontology. This agent applies an encryption/decryption algorithm to allow for the confidentiality, authenticity, and integrity of the most important rules. To increase the security of these rules, we used hybrid cryptography in order to take advantage of symmetric and asymmetric algorithms. We performed some experiments to find the best encryption algorithm, which provides improvement in terms of response time, space memory, and security.

Keywords

References

  1. D. Mouhamed, S. Maabout, K. Musumbu, "Generation automatique de regles metier par enrichissement semantique de modeles," 2007; https://liris.cnrs.fr/inforsid/sites/default/files/a661c1Ungr88gvmII.pdf.
  2. V. Legendre, G. Petitjean and T. Lepatre, "Gestion des regles ," Genie Logiciel, no. 92, pp. 43-52 , 2010.
  3. Chniti, P. Albert, and J. Charlet, "Gestion de la coherence des regles metier editees a partir d'ontologies OWL," in Proceeding of the 22nd French National Conference on Knowledge Engineering (IC2011), Chambery, France, 2011, pp. 589-606.
  4. D. Loshin, "Business rules," in Business Intelligence, 2nd ed. Waltham, MA: Morgan Kaufman, 2013, pp. 147-163.
  5. M. L. Nelson, J. Peterson, R. L. Rariden, and R. Sen, "Transitioning to a business rule management service model: case studies from the property and casualty insurance industry," Information & Management, vol. 47, no. 1, pp, 30-41, 2010. https://doi.org/10.1016/j.im.2009.09.007
  6. "La cryptographie definition," http://tpe-messages-secrets.e-monsite.com/pages/la-cryptographie/.
  7. Berzati, "Analyse cryptographique des alterations d'algorithmes," Ph.D. dissertation, University of Versailles Saint-Quentin en-Yvelines, 2010.
  8. M. Videau, "Criteres de securite des Algorithmes de Chiffrement a cle secrete," Ph.D. dissertation, PARIS 6 University, 2005,
  9. N. Sad Houari and N. Taghezout, "A combined use between rules, ontology and agents in BRMS design: application to SME in Algeria," in Proceedings of International Conference on Artificial Intelligence, Energy and Manufacturing Engineering (ICAEME'2015), Dubai, 2015, pp. 11-17.
  10. Chniti, "Gestion des dependances et des interactions entre Ontologies et Regles Metier," Ph.D. dissertation, PARIS 6 University, 2013.
  11. "Collaboration definition," https://en.wikipedia.org/wiki/Collaboration.
  12. "Collaboration definition," http://whatis.techtarget.com/definition/collaboration.
  13. S. Ram and J. Liu, "An agent-based approach for sourcing business rules in supply chain management," International Journal of Intelligent Information Technologies, vol. 1, no. 1, pp. 1-6, 2005. https://doi.org/10.4018/jiit.2005010101
  14. J. Ferber and J. F. Perrot, Les systemes multi-agents, vers une intelligence collective. Paris: InterEditions, 1995.
  15. D. Lavbic and R. Rupnik, "Multi-agent system for decision support in enterprises," Journal of Information and Organizational Sciences, vol. 33, no. 2, pp. 269-284, 2009.
  16. Lopez-Ortega and I. Villar-Medina, "A multi-agent system to construct production orders by employing an expert system and a neural network," Expert Systems with Applications, vol. 36, no. 1, pp. 2937-2946, 2009. https://doi.org/10.1016/j.eswa.2008.01.070
  17. M. Bajec and M. Krisper, "A methodology and tool support for managing business rules in organisations," Information Systems, vol. 30, no. 6, pp. 423-443, 2005. https://doi.org/10.1016/j.is.2004.05.003
  18. "Cryptography definition," http://searchsoftwarequality.techtarget.com/definition/cryptography.
  19. G. Soula, "La securite des reseaux numeriques, cryptologie et autres techniques," 2008 ; http://cybertim.timone.univ-mrs.fr/enseignement/doc-enseignement/informatique/securite%20reseaux%20techniques/docpeda_fichier.
  20. R. B. Philippe, "Principaux algorithmes de cryptage," 2002 ; http://prolland.free.fr/works/security/algo_crypto.pdf.
  21. V. Bernet-Rollande and S. Lallemand, "Rapport de TX Etude d'une attaque contre l'algorithme RC4," 2010.
  22. "Advanced Encryption Standard," http://math.univ-lyon1.fr/-roblot/resources/masterpro_chapitre_4.pdf.
  23. Lan and B. Vandevelde, "Panorama des algorithmes de cryptographie," 2011; http://veille-techno.blogs.ecnantes.fr/wp-content/uploads/2011/10/Crypto_final.pdf.
  24. Stineman, "Pourquoi des regles metier?: un cas pour les utilisateurs metier de l'informatique," 2009; ftp://public.dhe.ibm.com/software/fr/ilog/IBM_ILOG_-_Pourquoi_des_regles_metier.pdf.
  25. "Quel algorithme de chiffrement symetrique (symmetric cipher) choisir?" 2012; http://www.blog-des-telecoms.com/quel-algorithme-de-chiffrement-symetrique-symmetric-cipher-choisir/.
  26. Bruasse-Bac, "Algorithmes de chiffrement par bloc," https://repo.zenk-security.com/Cryptographie%20.%20Algorithmes%20.%20Steganographie/Algorithmes%20de%20chiffrement%20par%20bloc.pdf.
  27. Ali Pacha and N. Hadj-Saiad, "La Cryptographie et ses principaux systemes de references," RIST: revue d'information scientifique et technique, vol. 12, no. 1, pp. 173-193, 2002.
  28. "Hybrid encryption," https://www.techopedia.com/definition/1779/hybrid-encryption.